index.php 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325
  1. <?php
  2. define('NO_AUTH_REQUIRED',true);
  3. // Main include
  4. include($_SERVER['DOCUMENT_ROOT']."/inc/main.php");
  5. $TAB = 'login';
  6. /*
  7. // Logout
  8. if (isset($_GET['logout'])) {
  9. setcookie('limit2fa','',time() - 3600,"/");
  10. session_destroy();
  11. }
  12. */
  13. /* ACTIONS FOR CURRENT USER SESSION */
  14. if (isset($_SESSION['user'])) {
  15. // User impersonation
  16. // Allow administrators to view and manipulate contents of other user accounts
  17. if (($_SESSION['userContext'] === 'admin') && (!empty($_GET['loginas']))) {
  18. // Ensure token is passed and matches before granting user impersonation access
  19. if ((!$_GET['token']) || ($_SESSION['token'] != $_GET['token'])) {
  20. header('location: /list/user/');
  21. exit();
  22. } else {
  23. $v_user = escapeshellarg($_GET['loginas']);
  24. $v_impersonator = escapeshellarg($_SESSION['user']);
  25. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  26. if ( $return_var == 0 ) {
  27. $data = json_decode(implode('', $output), true);
  28. reset($data);
  29. $_SESSION['look'] = key($data);
  30. // Log impersonation events
  31. exec (HESTIA_CMD . "v-log-action ".$v_impersonator." 'Info' 'Security' 'Logged in as another user (User: $v_user)'", $output, $return_var);
  32. exec (HESTIA_CMD . "v-log-action system 'Warning' 'Security' 'User impersonation session started (User: $v_user, Administrator: $v_impersonator)'", $output, $return_var);
  33. // Reset account details for File Manager to impersonated user
  34. unset($_SESSION['_sf2_attributes']);
  35. unset($_SESSION['_sf2_meta']);
  36. header("Location: /login/");
  37. }
  38. }
  39. exit;
  40. }
  41. // Set view based on account properties
  42. if (empty($_GET['loginas'])) {
  43. // Default view to Users list for administrator accounts
  44. if (($_SESSION['userContext'] === 'admin') && (!isset($_SESSION['look']))) {
  45. header("Location: /list/user/");
  46. exit;
  47. }
  48. // Obtain account properties
  49. if (($_SESSION['userContext'] === 'admin') && (isset($_SESSION['look']))) {
  50. $v_user = escapeshellarg($_SESSION['look']);
  51. } else {
  52. $v_user = escapeshellarg($_SESSION['user']);
  53. }
  54. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  55. $data = json_decode(implode('', $output), true);
  56. unset($output);
  57. // Determine package features and land user at the first available page
  58. if ($data[$user]['WEB_DOMAINS'] !== "0") {
  59. header("Location: /list/web/");
  60. } else if ($data[$user]['DNS_DOMAINS'] !== "0") {
  61. header("Location: /list/dns/");
  62. } else if ($data[$user]['MAIL_DOMAINS'] !== "0") {
  63. header("Location: /list/mail/");
  64. } else if ($data[$user]['DATABASES'] !== "0") {
  65. header("Location: /list/db/");
  66. } else if ($data[$user]['CRON_JOBS'] !== "0") {
  67. header("Location: /list/cron/");
  68. } else if ($data[$user]['BACKUPS'] !== "0") {
  69. header("Location: /list/backup/");
  70. } else {
  71. header("Location: /error/");
  72. }
  73. exit;
  74. }
  75. // Do not allow non-administrators to access account impersonation
  76. if (($_SESSION['userContext'] !== 'admin') && (!empty($_GET['loginas']))) {
  77. header("Location: /login/");
  78. exit;
  79. }
  80. exit;
  81. }
  82. function authenticate_user($user, $password, $twofa = ''){
  83. unset($_SESSION['login']);
  84. if(isset($_SESSION['token']) && isset($_POST['token']) && $_POST['token'] == $_SESSION['token']) {
  85. $v_user = escapeshellarg($user);
  86. $ip = $_SERVER['REMOTE_ADDR'];
  87. $user_agent = $_SERVER['HTTP_USER_AGENT'];
  88. if(isset($_SERVER['HTTP_CF_CONNECTING_IP'])){
  89. if(!empty($_SERVER['HTTP_CF_CONNECTING_IP'])){
  90. $ip = $_SERVER['HTTP_CF_CONNECTING_IP'];
  91. }
  92. }
  93. $v_ip = escapeshellarg($ip);
  94. $v_user_agent = escapeshellarg($user_agent);
  95. // Get user's salt
  96. $output = '';
  97. exec (HESTIA_CMD."v-get-user-salt ".$v_user." ".$v_ip." json" , $output, $return_var);
  98. $pam = json_decode(implode('', $output), true);
  99. if ( $return_var > 0 ) {
  100. sleep(2);
  101. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  102. return $error;
  103. } else {
  104. $salt = $pam[$user]['SALT'];
  105. $method = $pam[$user]['METHOD'];
  106. if ($method == 'md5' ) {
  107. $hash = crypt($password, '$1$'.$salt.'$');
  108. }
  109. if ($method == 'sha-512' ) {
  110. $hash = crypt($password, '$6$rounds=5000$'.$salt.'$');
  111. $hash = str_replace('$rounds=5000','',$hash);
  112. }
  113. if ($method == 'des' ) {
  114. $hash = crypt($password, $salt);
  115. }
  116. // Send hash via tmp file
  117. $v_hash = exec('mktemp -p /tmp');
  118. $fp = fopen($v_hash, "w");
  119. fwrite($fp, $hash."\n");
  120. fclose($fp);
  121. // Check user hash
  122. exec(HESTIA_CMD ."v-check-user-hash ".$v_user." ".$v_hash." ".$v_ip, $output, $return_var);
  123. unset($output);
  124. // Remove tmp file
  125. unlink($v_hash);
  126. // Check API answer
  127. if ( $return_var > 0 ) {
  128. sleep(2);
  129. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  130. $v_session_id = escapeshellarg($_POST['token']);
  131. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_session_id." ".$v_user_agent, $output, $return_var);
  132. return $error;
  133. } else {
  134. // Get user specific parameters
  135. exec (HESTIA_CMD . "v-list-user ".$v_user." json", $output, $return_var);
  136. $data = json_decode(implode('', $output), true);
  137. unset($output);
  138. if ($data[$user]['LOGIN_DISABLED'] === 'yes') {
  139. sleep(2);
  140. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  141. $v_session_id = escapeshellarg($_POST['token']);
  142. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_session_id." ".$v_user_agent, $output, $return_var);
  143. return $error;
  144. }
  145. if ($data[$user]['LOGIN_USE_IPLIST'] === 'yes') {
  146. $v_login_user_allowed_ips = explode(',',$data[$user]['LOGIN_ALLOW_IPS']);
  147. if (!in_array($ip,$v_login_user_allowed_ips)) {
  148. sleep(2);
  149. $error = "<a class=\"error\">"._('Invalid username or password')."</a>";
  150. $v_session_id = escapeshellarg($_POST['token']);
  151. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_session_id." ".$v_user_agent, $output, $return_var);
  152. return $error;
  153. }
  154. }
  155. if ($data[$user]['TWOFA'] != '') {
  156. if(empty($twofa)){
  157. $_SESSION['login']['username'] = $user;
  158. $_SESSION['login']['password'] = $password;
  159. return false;
  160. }else{
  161. $v_twofa = escapeshellarg($twofa);
  162. exec(HESTIA_CMD ."v-check-user-2fa ".$v_user." ".$v_twofa, $output, $return_var);
  163. unset($output);
  164. if ( $return_var > 0 ) {
  165. sleep(2);
  166. $error = "<a class=\"error\">"._('Invalid or missing 2FA token')."</a>";
  167. $_SESSION['login']['username'] = $user;
  168. $_SESSION['login']['password'] = $password;
  169. $v_session_id = escapeshellarg($_POST['token']);
  170. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." failed ".$v_session_id." ".$v_user_agent, $output, $return_var);
  171. return $error;
  172. unset($_POST['twofa']);
  173. }
  174. }
  175. }
  176. // Define session user
  177. $_SESSION['user'] = key($data);
  178. $v_user = $_SESSION['user'];
  179. //log successfull login attempt
  180. $v_session_id = escapeshellarg($_POST['token']);
  181. exec(HESTIA_CMD."v-log-user-login ".$v_user." ".$v_ip." success ".$v_session_id." ".$v_user_agent, $output, $return_var);
  182. $_SESSION['LAST_ACTIVITY'] = time();
  183. $_SESSION['MURMUR'] = $_POST['murmur'];
  184. // Define user role / context
  185. $_SESSION['userContext'] = $data[$user]['ROLE'];
  186. // Set active user theme on login
  187. $_SESSION['userTheme'] = $data[$user]['THEME'];
  188. if ($_SESSION['POLICY_USER_CHANGE_THEME'] !== 'yes') {
  189. unset($_SESSION['userTheme']);
  190. }
  191. if (!empty($data[$user]['PREF_UI_SORT'])) {
  192. $_SESSION['userSortOrder'] = $data[$user]['PREF_UI_SORT'];
  193. } else {
  194. $_SESSION['userSortOrder'] = 'name';
  195. }
  196. // Define language
  197. $output = '';
  198. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  199. $languages = json_decode(implode('', $output), true);
  200. if (in_array($data[$v_user]['LANGUAGE'], $languages)){
  201. $_SESSION['language'] = $data[$user]['LANGUAGE'];
  202. } else {
  203. $_SESSION['language'] = 'en';
  204. }
  205. // Regenerate session id to prevent session fixation
  206. session_regenerate_id();
  207. // Redirect request to control panel interface
  208. if (!empty($_SESSION['request_uri'])) {
  209. header("Location: ".$_SESSION['request_uri']);
  210. unset($_SESSION['request_uri']);
  211. exit;
  212. } else {
  213. if ($_SESSION['userContext'] === 'admin') {
  214. header("Location: /list/user/");
  215. } else {
  216. if($data[$user]['WEB_DOMAINS'] != "0") {
  217. header("Location: /list/web/");
  218. } else if ($data[$user]['DNS_DOMAINS'] != "0") {
  219. header("Location: /list/dns/");
  220. } else if ($data[$user]['MAIL_DOMAINS'] != "0") {
  221. header("Location: /list/mail/");
  222. } else if ($data[$user]['DATABASES'] != "0") {
  223. header("Location: /list/db/");
  224. } else if ($data[$user]['CRON_JOBS'] != "0") {
  225. header("Location: /list/cron/");
  226. } else if ($data[$user]['BACKUPS'] != "0") {
  227. header("Location: /list/backup/");
  228. } else {
  229. header("Location: /error/");
  230. }
  231. }
  232. exit;
  233. }
  234. }
  235. }
  236. } else {
  237. unset($_POST);
  238. unset($_GET);
  239. unset($_SESSION);
  240. session_destroy();
  241. session_start();
  242. return false;
  243. }
  244. }
  245. if (!empty($_SESSION['login']['username']) && !empty($_SESSION['login']['password']) && !empty($_POST['twofa'])){
  246. $error = authenticate_user($_SESSION['login']['username'], $_SESSION['login']['password'], $_POST['twofa']);
  247. unset($_POST);
  248. } else if (!empty($_POST['user']) && !empty($_POST['password'])) {
  249. $error = authenticate_user($_POST['user'], $_POST['password']);
  250. unset($_POST);
  251. }else{
  252. unset($_SESSION['login']);
  253. }
  254. // Check system configuration
  255. load_hestia_config();
  256. // Detect language
  257. if (empty($_SESSION['language'])) {
  258. $output = '';
  259. exec (HESTIA_CMD."v-list-sys-config json", $output, $return_var);
  260. $config = json_decode(implode('', $output), true);
  261. $lang = $config['config']['LANGUAGE'];
  262. $output = '';
  263. exec (HESTIA_CMD."v-list-sys-languages json", $output, $return_var);
  264. $languages = json_decode(implode('', $output), true);
  265. if(in_array($lang, $languages)){
  266. $_SESSION['language'] = $lang;
  267. }
  268. else {
  269. $_SESSION['language'] = 'en';
  270. }
  271. }
  272. // Generate CSRF token
  273. $_SESSION['token'] = md5(uniqid(mt_rand(), true));
  274. require_once('../templates/header.html');
  275. if(!empty($_SESSION['login'])){
  276. require_once('..templates/pages/login/login_2.html');
  277. }else if (empty($_POST['user'])) {
  278. if($_SESSION['LOGIN_STYLE'] == 'old'){
  279. require_once('../templates/pages/login/login_a.html');
  280. }else{
  281. require_once('../templates/pages/login/login.html');
  282. }
  283. }else if (empty($_POST['password'])) {
  284. require_once('../templates/pages/login/login_1.html');
  285. }else{
  286. if($_SESSION['LOGIN_STYLE'] == 'old'){
  287. require_once('../templates/pages/login/login_a.html');
  288. }else{
  289. require_once('../templates/pages/login/login.html');
  290. }
  291. }
  292. ?>